Implementing cybersecurity : (Record no. 48942)

MARC details
000 -LEADER
fixed length control field 04092cmm a2200325 a 4500
001 - CONTROL NUMBER
control field 46932
003 - CONTROL NUMBER IDENTIFIER
control field IN-BdCUP
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230426175606.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230426s2023 u eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781315229652
040 ## - CATALOGING SOURCE
Language of cataloging eng
Transcribing agency IN-BdCUP
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.800
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Kohnke, Anne
245 #0 - TITLE STATEMENT
Title Implementing cybersecurity :
Remainder of title a guide to the National Institute of Standards and Technology Risk Management Framework /
Statement of responsibility, etc. by Anne Kohnke, Ken Sigler and Dan Shoemaker
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton, FL :
Name of publisher, distributor, etc. Auerbach Publications, an imprint of Taylor and Francis,
Date of publication, distribution, etc. 2017
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (337 pages)
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Half Title -- Title Page -- Copyright page -- Contents -- Foreword -- Preface -- Why the NIST RMF Is Important -- Practical Benefits of Implementing???the???Risk Management Model -- Who Should Read This Book -- Organization of This Text -- Chapter 1: Introduction to Organizational Security Risk Management -- Chapter 2: Survey of Existing Risk Management Models -- Chapter 3: Step 1???Categorize Information and Information Systems -- Chapter 4: Step 2???Select Security Controls -- Chapter 5: Step 3???Implement Security Controls -- Chapter 6: Step 4???Assess Security Controls -- Chapter 7: Step 5???Authorize Information Systems -- Chapter 8: Step 6???Monitor Security State -- Chapter 9: Practical Application of the NIST RMF -- Appendix: (ISC)2 Certified Authorization Professional (CAP) Certification -- Authors -- Chapter 1: Introduction to Organizational Security Risk Management -- 1.1 Introduction to the Book -- 1.2 Risk Is Inevitable -- 1.3 Strategic Governance and Risk Management -- 1.4 Elements of Risk Management -- 1.5 Risk Types and Risk Handling Strategies -- 1.6 Overview of the Risk Management Process -- 1.7 Chapter Summary -- Glossary -- Chapter 2: Survey of Existing Risk Management Frameworks -- 2.1 Survey of Existing Risk Management Models and Frameworks -- 2.2 Standard Best Practice -- 2.3 Making Risk Management Tangible -- 2.4 Formal Architectures -- 2.5 General Shape of the RMF Process -- 2.6 RMF Implementation -- 2.7 Other Frameworks and Models for Risk Management -- 2.8 International Organization for Standardization 31000:2009 -- 2.9 ISO 31000 Implementation Process: Establishment -- 2.10 COSO Enterprise Risk Management Framework -- 2.11 Health Information Trust Alliance Common Security Framework -- 2.12 Implementing the HITRUST CSF Control Structure -- 2.13 NIST SP 800-30 and NIST SP 800-39 Standards -- 2.14 Chapter Summary -- Glossary -- References -- Chapter 3: Step 1 Categorize Information and Information Systems -- 3.1 Introduction -- 3.2 Security Impact Analysis -- 3.3 FIPS 199, Standards for Security Categorization of Federal Information and Information Systems -- 3.4 CNSSI No. 1253, Security Categorization and Control Selection for National Security Systems -- 3.5 Security Categorization from the Organizational Perspective -- 3.6 Chapter Summary -- References -- Chapter 4: Step 2???Select Security Controls
520 ## - SUMMARY, ETC.
Summary, etc. The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an application of the risk management process as well as the fundamental elements of control formulation within an applied context
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Risk management
Topical term or geographic name entry element Computer security
Topical term or geographic name entry element Computer networks
Topical term or geographic name entry element Information technology
Topical term or geographic name entry element COMPUTERS--Networking--General
Topical term or geographic name entry element COMPUTERS--Security--General
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Sigler, Ken
Personal name Shoemaker, Dan
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Electronic Book Resource
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781315229652">https://www.taylorfrancis.com/books/9781315229652</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type E-Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total checkouts Full call number Barcode Date last seen Uniform resource identifier Bill Date Koha item type
    Dewey Decimal Classification     Ranganathan Library Ranganathan Library 07/04/2022 Taylor & Francis   005.800 E01536 26/04/2023 https://www.taylorfrancis.com/books/9781315229652 07/04/2022 E-Book
This system is made operational by the in-house staff of the CUP Library.